{"id":6206,"date":"2022-08-24T15:57:12","date_gmt":"2022-08-24T09:57:12","guid":{"rendered":"https:\/\/isoc.kg\/?p=6206"},"modified":"2022-08-24T15:57:25","modified_gmt":"2022-08-24T09:57:25","slug":"how-do-i-know-if-youve-been-hacked","status":"publish","type":"post","link":"https:\/\/isoc.kg\/kg\/projects\/how-do-i-know-if-youve-been-hacked\/","title":{"rendered":"How do I know if you&#8217;ve been hacked?"},"content":{"rendered":"<p>If not every day, then quite often we can observe in the news headlines that a particular company, organization, firm was hacked and lost the data of its millions of users due to a hacker attack, a zero-day exploit, a software glitch or because of the &#8220;straightforwardness&#8221; of the hands of its programmers.<\/p>\n<p>It is possible that a social network, applications, an online game or another Internet resource that we regularly use has already been among the hacked ones or may be in the future.<\/p>\n<p>How do I know if you are a victim? Have you been hacked? How do I determine if you have an account (login, email address) that has been compromised in a data breach? Do you have a strong password or is it completely insecure? How to prevent a potential hacking threat?<\/p>\n<p> haveibeenpwned service &#8211; will help us with this. Let&#8217;s take a closer look at what it is and how it works.<\/p>\n<p>__________________________<\/p>\n<p> Source: http:\/\/withsecurity.ru\/kak-uznat-byl-li-ya-vzloman-have-i-been-pwned-hibp<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/4-5-300x300.png\" alt=\"\" width=\"300\" height=\"300\" class=\"alignnone size-medium wp-image-6208\" srcset=\"https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/4-5-300x300.png 300w, https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/4-5-1024x1024.png 1024w, https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/4-5-150x150.png 150w, https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/4-5-768x768.png 768w, https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/4-5.png 1080w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/3-7-300x300.png\" alt=\"\" width=\"300\" height=\"300\" class=\"alignnone size-medium wp-image-6209\" srcset=\"https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/3-7-300x300.png 300w, https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/3-7-1024x1024.png 1024w, https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/3-7-150x150.png 150w, https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/3-7-768x768.png 768w, https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/3-7.png 1080w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/2-6-300x300.png\" alt=\"\" width=\"300\" height=\"300\" class=\"alignnone size-medium wp-image-6210\" srcset=\"https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/2-6-300x300.png 300w, https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/2-6-1024x1024.png 1024w, https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/2-6-150x150.png 150w, https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/2-6-768x768.png 768w, https:\/\/isoc.kg\/wp-content\/uploads\/2022\/08\/2-6.png 1080w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If not every day, then quite often we can observe in the news headlines that a particular company, organization, firm was hacked and lost the data of its millions of users due to a hacker attack, a zero-day exploit, a software glitch or because of the &#8220;straightforwardness&#8221; of the hands of its programmers. It is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6207,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[95,77],"tags":[],"class_list":["post-6206","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech4society","category-projects"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"kg","enabled_languages":["en","ru","kg"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"ru":{"title":false,"content":false,"excerpt":false},"kg":{"title":false,"content":false,"excerpt":false}}},"acf":[],"_links":{"self":[{"href":"https:\/\/isoc.kg\/kg\/wp-json\/wp\/v2\/posts\/6206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/isoc.kg\/kg\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isoc.kg\/kg\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isoc.kg\/kg\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isoc.kg\/kg\/wp-json\/wp\/v2\/comments?post=6206"}],"version-history":[{"count":0,"href":"https:\/\/isoc.kg\/kg\/wp-json\/wp\/v2\/posts\/6206\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/isoc.kg\/kg\/wp-json\/wp\/v2\/media\/6207"}],"wp:attachment":[{"href":"https:\/\/isoc.kg\/kg\/wp-json\/wp\/v2\/media?parent=6206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isoc.kg\/kg\/wp-json\/wp\/v2\/categories?post=6206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isoc.kg\/kg\/wp-json\/wp\/v2\/tags?post=6206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}